2011
DOI: 10.17485/ijst/2011/v4i7.5
|View full text |Cite
|
Sign up to set email alerts
|

Secure optical communication using chaos

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…This makes the system to be secure from brute force attacks and it is difficult to make long term predictions on chaotic systems. Due to the properties of chaos system, recent researches of encryption algorithms have been increasingly based on chaotic systems [6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…This makes the system to be secure from brute force attacks and it is difficult to make long term predictions on chaotic systems. Due to the properties of chaos system, recent researches of encryption algorithms have been increasingly based on chaotic systems [6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…This makes the system to be secure from brute force attacks and it is difficult to make long term predictions on chaotic systems. Due to the properties of chaos system, recent researches of encryption algorithms have been increasingly based on chaotic systems [6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%